s/writeable/writable

"Writable" is the correct spelling according to Merriam-Webster:
https://www.merriam-webster.com/dictionary/writable

Change-Id: I36b48403275164bdc448f44e1e5e73f18b3be740
Reviewed-on: https://fuchsia-review.googlesource.com/c/shac-project/shac/+/904698
Commit-Queue: Auto-Submit <auto-submit@fuchsia-infra.iam.gserviceaccount.com>
Reviewed-by: Marc-Antoine Ruel <maruel@google.com>
Fuchsia-Auto-Submit: Oliver Newman <olivernewman@google.com>
diff --git a/internal/engine/runtime_ctx_os.go b/internal/engine/runtime_ctx_os.go
index aca6d78..e8af0fe 100644
--- a/internal/engine/runtime_ctx_os.go
+++ b/internal/engine/runtime_ctx_os.go
@@ -305,9 +305,9 @@
 	if runtime.GOOS != "windows" {
 		config.Mounts = []sandbox.Mount{
 			// TODO(olivernewman): Mount the checkout read-only unconditionally.
-			{Path: s.root, Writeable: s.writableRoot},
+			{Path: s.root, Writable: s.writableRoot},
 			// OS-provided utilities.
-			{Path: "/dev/null", Writeable: true},
+			{Path: "/dev/null", Writable: true},
 			{Path: "/dev/urandom"},
 			{Path: "/dev/zero"},
 			// DNS configs.
@@ -325,7 +325,7 @@
 			// Make the parent directory of tempDir available, since it is the root
 			// of all ctx.os.tempdir() calls, which can be used as scratch pads for
 			// this executable.
-			{Path: filepath.Dir(tempDir), Writeable: true},
+			{Path: filepath.Dir(tempDir), Writable: true},
 		}
 
 		// TODO(olivernewman): This is necessary because checks for shac itself
diff --git a/internal/sandbox/sandbox.go b/internal/sandbox/sandbox.go
index e0eec65..33a3a40 100644
--- a/internal/sandbox/sandbox.go
+++ b/internal/sandbox/sandbox.go
@@ -37,9 +37,9 @@
 	// Dest is the optional location to mount in the nsjail. If omitted, it will
 	// be assumed to be the same as Path.
 	Dest string
-	// Writeable controls whether the mount is writeable by processes within the
+	// Writable controls whether the mount is writable by processes within the
 	// nsjail.
-	Writeable bool
+	Writable bool
 }
 
 // Config represents the configuration for a sandboxed subprocess.
@@ -112,14 +112,14 @@
 		args = append(args, "--env", fmt.Sprintf("%s=%s", k, v))
 	}
 	// nsjail is strict about ordering of --bindmount flags. If /a and /a/b are
-	// both to be mounted (/a might be read-only while /a/b is writeable), then
+	// both to be mounted (/a might be read-only while /a/b is writable), then
 	// /a must precede /a/b in the arguments.
 	sort.Slice(config.Mounts, func(i, j int) bool {
 		return config.Mounts[i].Path < config.Mounts[j].Path
 	})
 	for _, mnt := range config.Mounts {
 		flag := "--bindmount_ro"
-		if mnt.Writeable {
+		if mnt.Writable {
 			flag = "--bindmount"
 		}
 		val := mnt.Path